Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-27CitizenLabJohn Scott-Railton, Katie Kleemola
@online{scottrailton:20150827:london:d3ff105, author = {John Scott-Railton and Katie Kleemola}, title = {{London Calling: Two-Factor Authentication Phishing From Iran}}, date = {2015-08-27}, organization = {CitizenLab}, url = {https://citizenlab.ca/2015/08/iran_two_factor_phishing/}, language = {English}, urldate = {2020-04-06} } London Calling: Two-Factor Authentication Phishing From Iran
Rocket Kitten
2015-07-13SymantecA L Johnson
@online{johnson:20150713:forkmeiamfamous:64957d9, author = {A L Johnson}, title = {{“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory}}, date = {2015-07-13}, organization = {Symantec}, url = {https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=6ab66701-25d7-4685-ae9d-93d63708a11c&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments}, language = {English}, urldate = {2020-08-19} } “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
SEADADDY
2014-04-18Trend MicroAlvin John Nieto
@online{nieto:20140418:troj64wowlikvt:a785d3a, author = {Alvin John Nieto}, title = {{TROJ64_WOWLIK.VT}}, date = {2014-04-18}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj64_wowlik.vt}, language = {English}, urldate = {2020-01-13} } TROJ64_WOWLIK.VT
Alureon
2013-02-19SymantecA L Johnson
@online{johnson:20130219:apt1:ee9c94f, author = {A L Johnson}, title = {{APT1: Q&A on Attacks by the Comment Crew}}, date = {2013-02-19}, organization = {Symantec}, url = {https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=f1265df5-6e5e-4fcc-9828-d4ddbbafd3d7&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments}, language = {English}, urldate = {2020-04-21} } APT1: Q&A on Attacks by the Comment Crew
APT1
2012-09-06BroadcomA L Johnson
@online{johnson:20120906:elderwood:513c2a6, author = {A L Johnson}, title = {{The Elderwood Project}}, date = {2012-09-06}, organization = {Broadcom}, url = {https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=3b0d679a-3707-4075-a2a9-37d1af16d411&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments}, language = {English}, urldate = {2023-10-05} } The Elderwood Project
Beijing Group
2012-06-04John Leyden
@online{leyden:20120604:small:eb760a3, author = {John Leyden}, title = {{Small banking Trojan poses major risk}}, date = {2012-06-04}, url = {http://www.theregister.co.uk/2012/06/04/small_banking_trojan/}, language = {English}, urldate = {2020-01-08} } Small banking Trojan poses major risk
Tinba
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:b955948, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://web.archive.org/web/20140816135909/https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-04-21} } Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:a85984a, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-01-06} } Inside a Back Door Attack
Dust Storm
2009-12-22SymantecJohn McDonald, Masaki Suenaga, Takayoshi Nakayama
@online{mcdonald:20091222:qakbot:fb2517b, author = {John McDonald and Masaki Suenaga and Takayoshi Nakayama}, title = {{Qakbot, Data Thief Unmasked: Part II}}, date = {2009-12-22}, organization = {Symantec}, url = {https://web.archive.org/web/20110406012907/http://www.symantec.com/connect/blogs/qakbot-data-thief-unmasked-part-ii}, language = {English}, urldate = {2023-08-30} } Qakbot, Data Thief Unmasked: Part II
QakBot